APPENDIX B
Network Site Survey
Guidance
1. Critical information assets that are electronically available only on individual machines are not the subject of this survey. Critical information assets include proprietary data, databases, trade secrets, human resources data, cost data, and other similar information.
2. All critical information assets accessible via networks (not media stored in repositories) are the subject of this survey.
3. The purpose of this survey is to collect preliminary information on the cyber protections at each site. These are categorized as:
a. Detection or Entry Control, such as
i. Passwords
ii. Sniffers
iii. Audits
iv. Real-time monitoring
v. Intrusion Detection System software
b. Delay, such as
i. Encryption
Get Design and Evaluation of Physical Protection Systems, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.